For Wolverhampton Linux User Group By Adam Sweet

Slides:



Advertisements
Similar presentations
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
Advertisements

1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.1 Module 6 Switch Configuration.
Introduction to the Cisco IOS
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
CCNA 2 v3.1 Module 2.
Supermicro © 2009 GPU Solutions Universal I/O Double-Sided Datacenter Optimized Twin Architecture SuperBlade ® Storage Embedded IPMI.
April WebEx Intel ® Active Management Technology (AMT) LANDesk Provisioning LANDesk Server Manager.
Terminal and Console Access Unix/IP Preparation Course May 29, 2011 Dar es Salaam, Tanzania.
Routers A router is a computer Computers have four basic components:
CISCO ROUTER.  The Cisco router IOS  Enhanced editing  Administrative functions  Hostnames  Banners  Passwords  Interface descriptions  Verifying.
1 Linux Basics for Networking. 2 Module - Linux Basics for Networking ♦ Overview This module focuses on the basics of networking using Redhat Enterprise.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Cisco Routers Objectives –How to log into a Cisco router and determine basic settings. Contents –Differences in available methods of access. –Different.
Saeed Darvish Pazoki – MCSE, CCNA Abstracted From: Cisco Press – ICND 1 – Chapter 9 Ethernet Switch Configuration 1.
Discovery 2 Internetworking Module 5 JEOPARDY John Celum.
Basic Router Configuration 1.1 Global configuration Cisco allows us to configure the router to support various protocols and interfaces. The router stores.
IPMI 2.0 Overview SOL-Serial redirection over Lan Management of servers and systems in a remote environment over LAN connections Allow IT managers to manage.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
PacNOG 6: Nadi, Fiji Terminal and Console Access Hervey Allen Network Startup Resource Center.
Router Fundamentals PJC CCNA Semester 2 Ver. 3.0 by William Kelly.
7200 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. 1/16 OfficeServ 7200 Enterprise IP Solutions Data Server S/W Upgrade.
1 Router Fundamentals (Ref. CCNA5 Introduction to Networks 2.1, 6.3)
Super Micro IPMI 1.5 Solution
CCNA2 Chapter 2 Cisco IOS Software. Cisco’s operating system is called Cisco Internetwork Operating System (IOS) IOS provides the following network services:
Terminal and Console Access Unix/IP Preparation Course July 19, 2009 Eugene, Oregon, USA
Hands-On Virtual Computing
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Router Initialization steps.
Chapter 2: Configure a Network Operating System
DPM - IPMI Product Support Engineering VMware Confidential.
Update on Farm Monitor and Control Domenico Galli, Bologna RTTC meeting Genève, 14 april 2004.
Running clusters on a Shoestring Fermilab SC 2007.
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
Cisco 2 - Routers Perrine. J Page 16/26/2016 Chapter 2 Cisco IOS Software Cisco’s operating system is called Cisco Internetwork Operating System (IOS)
Running clusters on a Shoestring US Lattice QCD Fermilab SC 2007.
Future Console Servers devproj project #31. Overview ● Requirements / motivation ● Current approach ● Possible future options – KVM over IP – IPMI – Serial.
Instructor Materials Chapter 8 Configuring Cisco Devices
Operating System Kernel Compilation
VMware ESX and ESXi Module 3.
Layer 3 Redundancy 1. Hot Standby Router Protocol (HSRP)
Instructor Materials Chapter 6: Network Layer
Instructor Materials Chapter 2: Configure a Network Operating System
Chapter Objectives In this chapter, you will learn:
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 2: Configure a Network Operating System
Understanding Switch Security
CCNA Routing and Switching Routing and Switching Essentials v6.0
Data Server S/W Upgrade Samsung Electronics Co., Ltd.
Embedded IPMI.
Chapter 5: Switch Configuration
Cisco Switching Basics
Introduction to the Junos Operating System
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
© 2002, Cisco Systems, Inc. All rights reserved.
Chapter 6: Network Layer
Introduction to Networking
NAT , Device Discovery Chapter 9 , chapter 10.
Understanding Switch Security
Operating System Kernel Compilation
Chapter 5: Switch Configuration
Chapter 2: Configure a Network Operating System
Chapter 10: Device Discovery, Management, and Maintenance
Understanding Cisco Router Security
Hardware Appliance Installation and Configuration
Chapter 5: Switch Configuration
– Chapter 3 – Device Security (B)
Sem 2v2 Chapter4: Router Components
Introduction to Cisco IOS -(Internetwork Operating System)
Lecture9: Embedded Network Operating System: cisco IOS
Lecture9: Embedded Network Operating System: cisco IOS
Presentation transcript:

For Wolverhampton Linux User Group By Adam Sweet What On Earth Is IPMI? For Wolverhampton Linux User Group By Adam Sweet 04/02/2018

What On Earth Is IPMI? What is IPMI? What Can I Do With It? Versions of IPMI Configuring IPMI Basic IPMI Commands Controlling Remote Machines Other Useful Commands Using SOL to Get a Remote Console IPMIView Screenshots Further Configuration Negatives? Links

What is IPMI? IPMI is: Intelligent Platform Management Interface A specification created by an Intel led committee to create common interface for out-of-band hardware management Independent of the Operating System Works over UDP port 623 using RMCP (Remote Management Control Protocol), or locally via kernel drivers Only available on server hardware which supports it and is similar to LOM (Lights Out Management) and ILO Has CLI tools which is similar to the Cisco IOS CLI and some (normally proprietary) GUI tools IPMI requires a hardware device called a BMC (Baseboard Management Controller), either built-in to the motherboard or as a daughter card

What Can I Do With It? The primary benefits of IPMI: View server chassis and motherboard sensor output remotely, such as power status, chassis intrusion detection, fan speeds and motherboard temperatures Ability to remotely power on, power off, reboot the server and flash the identification light whether the OS is running or not Use SNMP to send Platform Event Traps Ability to run a console on a serial port and redirect the console over a network interface, which with BIOS and bootloader console redirection, lets you view the BIOS, bootloader, the bootup and shutdown procedures and console output remotely even if the OS dies. This is called Serial Over Lan (SOL) The BMC works regardless of whether the OS is operational or whether the machine is powered on, so long as there is power available

What Can I Do With It? The point of IPMI for me is: I can reboot and power machines on or off remotely when the OS hangs, without paying for an IP addressable Power Distribution Unit (PDU) A PDU only lets you choose whether to supply power to a machine or not, if you are supplying power to a machine but it isn't powered on, there is no way to turn it on I can get a serial console remotely in situations where SSH or telnet aren't available, such as managing the BIOS and the bootloader, without paying for an IP addressable KVM I can get remote serial console access when the OS has hung or kernel panicked, when a machine won't boot or shutdown, or when it goes into interactive fsck or maintenance mode at boot- time, without paying for an IP addressable KVM IP PDUs and IP KVMs are very expensive for a small business

Versions of IPMI There are currently 3 IPMI revisions: IPMI v1.0 - Autonomous access, logging and control. IPMI messaging command sets, sensor data records and event messages. Access through system interfaces like memory mapped IO, I2C bus etc IPMI v1.5 - Ability to send IPMI messages to BMC over LAN, LAN alerting. SOL using non-standard proprietary methods IPMI v2.0 - Serial Over LAN standardised, enabling console redirection, access control, enhanced authentication, packet encryption using RCMP+ instead of RCMP, SMbus interface SOL allows you to manage the server as though it were local when the OS locks up and SSH or telnet access are not available. IPMI v1.5 still allows to you to remotely power the system on and off and view sensor output

Configuring IPMI Of course you need a BMC first... You need to configure your BMC with it's own unique IP address, this can be in the BIOS, using the manufacturers tools, or in the OS after installing the right tool On your server you need to install OpenIPMI (aka openipmi in Debian derivs) and ipmitool (aka OpenIPMI-tools in RH/Fedora) On your network management node you need to install ipmitool (aka OpenIPMI-tools) You need to tell your OS to load the drivers, either manually, using /etc/modules (Debian derivs), or chkconfig ipmi on; service ipmi start (in RH/Fedora)

Configuring IPMI Getting a SOL console: Tell your BIOS to redirect a 19.2Kb vt100 console over com1 Some BMCs can do different speeds, but 19.2Kb is a default Tell grub to run a similar console over ttyS1 (aka com1): kernel /vmlinuz-2.6.22-14-amd64-server root=/dev/sda2 ro console=tty0 console=ttyS1,19200n8r Disable rhgb, splash image and hidden menu in Grub Tell init to do the same: (Deb) S1:2345:respawn:/sbin/getty -L ttyS1 19200 vt100 (RH) S1:2345:respawn:/sbin/agetty -h ttyS1 19200 vt100 Fedora seems to the above step for me recently Reboot and you're good to go

Basic IPMI Commands ipmitool syntax is similar to Cisco IOS For each command sent without options, it will provide you with a list of subcommands Basic command, run locally, as root: ipmitool <command> Such as: ipmitool chassis power status Chassis Power is on Try it without any commands at first to get a list of options and then build up your subcommands as you go

Controlling Remote Machines Using IPMI to Control Remote Machines Example command: ipmitool -I lan -H 192.168.10.15 -U admin -a chassis power status -I lan means we're talking to a BMC lan interface -H is the host IP or resolvable hostname -U is the BMC username -a means we will supply the password at a prompt the last part is the command itself

Other Useful Commands chassis power off (an immediate hard power off) chassis power on chassis power reboot (combination of off and then on) chassis power reset (like pressing reset switch) chassis status (sensor readings etc) lan print 1 (prints the lan settings) lan set 1 <subcommand> (configures lan settings) BMCs have more than one channel, 1 is normally the LAN interface

Further Configuration Some Supermicro BMCs arp gratuitously which degrades network performance, so turn it off: ipmitool lan set 1 arp generate off Set the BMC’s netmask as well as it’s default and backup gateways: ipmitool lan set 1 netmask 255.255.255.0 ipmitool lan set 1 defgw ipaddr 192.168.1.1 ipmitool lan set 1 bakgw ipaddr 192.168.1.254 You can also set the gateway MAC addresses if you want to. Set it’s SNMP community name so that we can send SNMP traps: ipmitool lan set 1 snmp <community name> Supermicro also provide a Graceful Shutdown daemon for Linux, but I haven't played with that

Using SOL to Get a Remote Console All the magic is in the BIOS and the BMC, it should just work if you did the BIOS, bootloader and init configuration You just need an IPMI SOL application, like Supermicro's IPMIView, I haven't used or heard of any others. IPMIView is a Java Swing app for Windows and Linux IPMIView Screenshots (no window borders for single window screenshots under Compiz-Fusion apparently)...

Supermicro IPMIView Screenshots... Search for Devices

Supermicro IPMIView Screenshots... Login

Supermicro IPMIView Screenshots... Sensors

Supermicro IPMIView Screenshots... Device Control

Supermicro IPMIView Screenshots... LAN and SNMP

Supermicro IPMIView Screenshots... User Config

Supermicro IPMIView Screenshots... SOL Console

Supermicro IPMIView Screenshots... Virtual Media

Negatives? Not always 100% reliable, I've had BMCs stop responding to LAN traffic and a BMC cold restart didn't work, I had to remove the power from the server and then bring it back up again SOL connections seem to lose characters or get some in the wrong order if you type too fast Both of the above might be Supermicro BMC or IPMIView implementation issues rather than IPMI itself Not all IPMI 2.0 BMCs support RCMP+ encrypted sessions, no prior IPMI versions do Not all BMCs can do speeds other than 19.2Kb/s SOL isn't a perfect environment, but it's better than travelling to your datacentre in an emergency

Links Most Important first: http://wiki.adamsweet.org/doku.php?id=ipmi_on_linux Others: http://www.intel.com/design/servers/ipmi/ http://en.wikipedia.org/wiki/Intelligent_Platform_Management_Interface